NET NEUTRALITY Time magazine Person of the Year 2010
The readers voted for Julian Assange while the Editorial board for Mark Zuckerman.
Who knows what the editorial board’s reasoning was. One thing is for sure, it hangs around the division between the net neutrality/open data people and the rest.
Tim Berner-Lee
Long Live the Web: A Call for Continued Open Standards and Neutrality
– The Web is critical not merely to the digital revolution but to our continued prosperity—and even our liberty. Like democracy itself, it needs defending
Sci Am, 22 Nov 2010
says he doesn’t like social networks like Facebook because they ‘wall in data’.
Several threats to the Web’s universality have arisen recently. Cable television companies that sell Internet connectivity are considering whether to limit their Internet users to downloading only the company’s mix of entertainment. Social-networking sites present a different kind of problem. Facebook, LinkedIn, Friendster and others typically provide value by capturing information as you enter it: your birthday, your e-mail address, your likes, and links indicating who is friends with whom and who is in which photograph. The sites assemble these bits of data into brilliant databases and reuse the information to provide value-added service—but only within their sites. Once you enter your data into one of these services, you cannot easily use them on another site. Each site is a silo, walled off from the others. Yes, your site’s pages are on the Web, but your data are not. You can access a Web page about a list of people you have created in one site, but you cannot send that list, or items from it, to another site.
The isolation occurs because each piece of information does not have a URI. Connections among data exist only within a site. So the more you enter, the more you become locked in. Your social-networking site becomes a central platform—a closed silo of content, and one that does not give you full control over your information in it. The more this kind of architecture gains widespread use, the more the Web becomes fragmented, and the less we enjoy a single, universal information space.
A related danger is that one social-networking site—or one search engine or one browser—gets so big that it becomes a monopoly, which tends to limit innovation. As has been the case since the Web began, continued grassroots innovation may be the best check and balance against any one company or government that tries to undermine universality. GnuSocial and Diaspora are projects on the Web that allow anyone to create their own social network from their own server, connecting to anyone on any other site. The Status.net project, which runs sites such as identi.ca, allows you to operate your own Twitter-like network without the Twitter-like centralization.
This guy, as an example, pretty much shows where the net un-neutral are coming from. Neutrality, and the rest, interferes with their business models.
Huffington Post 19 December 2010:
‘SNL’: Julian Assange Responds To Mark Zuckerberg Being Named ‘Person Of The Year’ (VIDEO)
You know your famous when an actor starts to do you on prime time TV. The money quote:
“I give you private information on corporations for free and I’m a villain. Mark Zuckerberg gives your private information to corporations for money and he’s ‘Man of the Year.'”
-
Archives
- August 2012 (1)
- May 2012 (1)
- April 2012 (8)
- February 2012 (1)
- January 2012 (14)
- December 2011 (11)
- October 2011 (11)
- September 2011 (7)
- July 2011 (5)
- June 2011 (9)
- May 2011 (26)
- April 2011 (17)
-
Categories
- "Collateral Murder" video
- #occupytheweb
- #ows
- 1917 Espionage Act
- 2703(d) order
- 2TE Corproration
- Aaron Barr
- ACLU
- ACTA
- actor-network theory
- Afghanistan documents
- Alan Rusbridger
- Amazon
- Amesys
- Amnesty International
- anarcho-capitalism
- Anders Johnsson
- anonymity
- anonymity online
- Anonymous
- anonymous networks
- anonymous remailers
- anonymous whistleblowing
- Antoine de Saint-Exupery
- Apple
- apps
- ASIO
- ASIS
- Assange
- Assange extradition
- asset misuse
- Bank of America
- Barrett Brown
- Bernard Keane
- Bill Gates
- Birgitta Jónsdóttir
- Bitcoin
- botnet
- Bradley Manning
- broadband
- Bruno Latour
- Bull S.A.
- Cambridge Union
- Canberra cyber security centre
- CCDCOE
- censorship-circumventing software
- Centre for Security and Intelligence Studies
- China
- Chris Dodd
- Citizen 2.0
- citizen journalism
- Clay Shirkey
- Cloud computing
- cognitive infilltration
- cognitive infiltration
- COICA
- Combating Online Infringement and Counterfeits Act [COICA]
- community wireless networks
- compliance
- connective knowledge
- connectivism
- conspiracy
- Conspiracy as Governance
- Cooperative Cyber Defence Centre of Excellence
- Cory Doctorow
- crowd sourcing
- cyber attacks
- Cyber Command
- cyber crime
- Cyber Defence League [Estonia]
- cyber espionage
- cyber rights
- cyber security
- cyber terrorism
- cyber warfare
- cyber-activism
- cyber-arms
- cyber-auxiliaries
- cyber-optimism
- cyber-pessimism
- cyber-tools
- cyber-utopianism
- cyber-war
- cybersiege [Estonia]
- cyberspace
- Cyberspace Policy Review
- cypherpunk
- cypherpunk philosophy
- cypherpunk rejectionists
- Czechoslovakia
- Daniel Domscheit-Berg
- Daniel Ellsberg
- Darwinism
- data analysis
- data journalism
- data leakage
- data security
- data-dump journalism
- David Correira
- David Friedman
- David Leigh
- DDOS
- DebateGraph
- Declan McCullagh
- Defence Signals Directorate
- Defence Signals Directorate (DSD
- Defense Advanced Research Projects Agency
- Denial of Service
- Department of Homeland Security
- Department of Justice [U.S.]
- Der Spiegel
- digileaks
- digital cash
- digital forensics
- digital journalism
- diplomatic cables
- DNSSEC
- DOJ
- DSD
- Duncan Frissell
- E-PARASITE Act
- Eagle System
- Echelon spy system
- Ed Cummings
- Egypt
- El País
- Electronic Frontier Foundation
- Electronic Frontier Foundation (EFF)
- encryption
- Eric Holder
- Eric Hughes
- Espionage Act
- Esther Dyson
- Estonia
- Estonian Internet Community (EIC)
- European Arrest Warrants (EAWs)
- European Counter Network [ECN]
- Evgeny Morozov
- FBI
- FGI
- fiat currency
- Finland
- France
- free government information [FGI]
- Friedrich Kittler
- Frontline Club
- GCHQ
- Global Online Freedom Act
- Government 1.0
- Government 2.0
- Govt 3.0
- graphic literacy
- Guantánamo
- Guardian
- hacker culture
- hackerworld
- hacking
- hacking tools
- hacktivism
- hacktivist
- Hans Ulrich Obrist
- HBGary
- HBGary Federal
- Helen Nissenbaum [privacy researcher]
- HQ2
- Hrafnsson
- i2e Technologies
- Ibsen
- Indentity Ecosystem Framework
- Indonesia
- info-war
- information security
- information silos
- Inside Wikileaks
- insider security
- insider threats
- insurance.aes256
- Inter-Parliamentary Union
- intercept
- International Transfer of Prisoners (ITP) scheme
- Internet
- internet activism
- Internet censorship
- internet engineers
- Internet filtering
- internet in a suitcase
- internet monitoring
- Internet packet
- Internet Relay Chat [IRC]
- internet-centrism
- interpersonal ties
- investigative journalism
- Iran
- Iraq War 2003
- Iraq war logs
- IRC
- ISP
- Israel Shamir
- Jacob Appelbaum
- James Ball
- Jan Palach
- Jaron Lanier
- Jónsdóttir
- Jeff Jarvis
- John Gilmore
- John Naughton
- Jonathan Stray
- Jonathan Zittrain
- journalism
- JP Rangaswami
- Julian Assange
- Kevin Mitnick
- kill switch
- L-3 Communications
- lamestream media
- Le Monde
- Lockheed Martin
- Low Orbit Ion Cannon [LOIC]
- Luke Harding
- Malcolm Gladwell
- Manning
- Mark S. Granovetter
- Mark Zuckerberg
- MARUTUKKU
- massive intercept gear
- MasterCard
- MayFirst/People Link
- media
- Micah Sifry
- Misha Glenny
- Mission Indonesia
- Mitch Kapor
- Mixmaster
- Mohamed Bouazizi
- MPAA
- MTI
- Myanmar
- Narus
- Natanz
- Nate Anderson
- National Center for Cybersecurity and Communications (NCCC)
- National Open Source Intelligence Centre
- National Security Agency [NSA]
- National Strategy for Trusted Identities in Cyberspace
- native apps
- Nepal
- net activism
- net neutrality
- netizen
- NetOwl Programme
- network anomalies
- network e-discovery
- Network security
- network silos
- network theory
- network-based pedagogy
- New York Times
- NSA
- NSTIC
- OECD
- on-line rights
- online anonymity
- online privacy
- ontology
- Open data
- open source
- Openleaks
- OPSEC [operations security]
- organisational network analysis
- P2P
- P2P Foundation
- Pakistan Papers
- Paul Carr
- PayPal
- PCNAA
- Peer-to-Peer
- Peiter Zatko
- Pentagon
- Pentagon Papers
- perfect forward secrecy
- personal data
- personal data economy
- Personal Democracy Forum
- Peter Ludlow
- Phil Zimmerman
- Phorm
- PIPA
- post-representational networks
- PostFinance
- POTUS
- Pretty Good Privacy (PGP)
- privacy
- Privacy Act
- Privacy Bill of Rights
- Protecting Cyberspace as a National Asset Act (PCNAA)
- public statistics
- public-key cryptography
- Radia Tapes
- Rap News 5
- RDF
- Reality Distortion Field
- redaction
- remailers
- Reporters Without Borders
- RIIA
- Riseup Networks
- rogue employee
- Ron Paul
- Rop Gonggrijp
- routing censorship
- Royal Institute of International Affairs
- RT
- RT [Russia Today]
- Sarah Lacy
- Sarah Palin
- Sascha Meinrath
- Scott Ludham
- Scott Ludlam
- Semantic Web
- Shell/Nigeria
- Shoe-Thrower's Index
- Signals Intelligence Automation Research Center [SARC]
- silo effect
- Single Person Organisation [SPO]
- SIPRNET
- Skype
- slacktivism
- Slavoj Žižek
- Smári McCarthy
- social media
- social networks
- social semantic web
- social silos
- socket puppets
- SOPA
- SPARQL
- SQL injection
- SRA
- SSL encryption
- Stephen Downes
- Stop Online Piracy Act
- Strict Transport Security
- Stuxnet
- Suelette Dreyfus
- sureveilance technology
- surveillance technology
- tactical media
- Takedown
- techno-libertarianism
- Telecommunications Interceptions and Access Act
- The Colbert Report
- The Crypto Anarchist Manifesto
- The Dragonfly Effect
- ThinThread
- Tim Burners-Lee
- Tim May
- Timothy C. May
- Timothy Garton Ash
- Titan Rain attacks
- Tom Espiner
- Tor
- Tor Project
- TrapWire
- trust
- trust models
- Tsutomu Shimamura
- Tunisia
- Tunisian cyberactivists
- Twitter data logs
- Twitter No Logs campaign
- U.S. diplomatic cables
- U.S.Embassy cables
- Uncategorized
- Unique Personality Organisation [UPO]
- Uprising Index
- US Department of Justice
- USCYBERCOM
- V for Vendetta
- VASTech
- Virtual Private Network (VPN)
- virtual tunnel
- Visa
- visualisation
- VPN
- Wall Street Journal
- walled gardens
- warrantless surveillance program
- Wau Holland
- Web 2.0
- Web 3.0
- web scraping
- whistleblowers
- WiFi
- WikiLeaks
- WikiLeaks rival
- WikiLeaks vs. The Yes Men
- Yemen
- You Loop
- YouTube
- Zeynep Tufekci
- Zizek
- ZXMT System
-
RSS
Entries RSS
Comments RSS